RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
The biochar prepared from sawdust raw material was applied in this study for the treatment of wastewater polluted with methyl orange dye. The effect of pH (2-11), initial concertation (50-250 mg/L) and time were studied. The isotherm of Langmuir, Frendluch and temkin models studied. The Langmuir model was the best to explain the adsorption process, maximum uptake was 136.67 mg/g at 25Co of methyl orange dye. Equilibrium reached after four hours of contact for most adsorbents.The values of thermodynamic parameters ∆G were negative at various temperatures, so the process spontaneous, while ∆H values were 16683 j/mol and ∆S values was 60.82 j/mol.k.
Background: Chronic periodontitis is a bacterial infection that result in bone destruction associated with the increasing level of salivary tumor necrosis alpha and interleukin6 that affect Mother-infant bonding status. The aim of the present study was to assess the relationship between the Mother-infant bonding status in mothers with chronic periodontitis in relation to Salivary Tumor necrosis factor alpha and Salivary Interleukin6. Materials and Methods: The selected sample consisted of mothers with chronic periodontitis compared with mothers with healthy periodontium in postpartum period, their age ranged between 30-40 years. Both groups were subjected to postpartum Bonding Questionnaire (PBQ). Periodontal health status was assessed f
... Show MoreBackground: Breast cancer is the commonest type of malignancy worldwide and in Iraq. It is a serious disease that affects the general health and cause systemic changes that affect the physical and chemical properties of saliva leading to adverse effects on oral health. This study was conducted toassess the tumor marker CA15-3 and selected elements in saliva and their relation to oral health status among breast cancer patients compared to control group. Materials and Methods: The total sample consisted of 60 women aged 35-45 years. 30 women were newly diagnosed with breast cancer before taking any treatment and surgery (study group) and 30 women without clinical signs and symptoms of breast cancer as a control group. Dental caries was record
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreIn this work, the detection of zinc (Zn) ions that cause water pollution is studied using the CSNPs- Linker-alkaloids compound that was prepared by linking extracted alkaloids from Iraqi Catharanthus roseus plant with Chitosan nanoparticles (CSNPs) using maleic anhydride. This compound is characterized by an X-ray diffractometer (XRD) which shows that it has an orthorhombic structure with crystallite size in the nano dimension. Zeta Potential results show that the CSNPs-Linker-alkaloids carried a positive charge of 54.4 mV, which means it possesses high stability. The Fourier transform infrared spectroscopy (FTIR) shows a new distinct band at 1708.93 cm-1 due to C=O esterification. Scanning electron microscope (SEM) image
... Show MoreIn this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreIn this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.